 |
|
 Forensic Science
This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene... |  |  The H.264 Advanced Video Compression Standard
H.264 Advanced Video Coding or MPEG-4 Part 10 is fundamental to a growing range of markets such as high definition broadcasting, internet video sharing, mobile video and digital surveillance. This book reflects the growing importance and implementation of H.264 video technology. Offering a detailed overview of the system, it explains the... |  |  Expert F# 2.0 (Expert's Voice in F#)
Expert F# 2.0 is about practical programming in a beautiful language that puts the power and elegance of functional programming into the hands of professional developers. In combination with .NET, F# achieves unrivaled levels of programmer productivity and program clarity.
Expert F# 2.0 is
|
|
|
 The Gale Encyclopedia of Medicine
The Gale Encyclopedia of Medicine 2 (GEM2) is a one-stop source for medical information on nearly 1,700 common medical disorders, conditions, tests, and treatments, including high-profile diseases such as AIDS, Alzheimer’s disease, cancer, and heart attack. This encyclopedia avoids medical jargon and uses language that laypersons can... |  |  Data Protection in a Profiled World
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data... |  |  Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand.... |
|
 Web Service Contract Design and Versioning for SOA
The Ultimate Guide for Designing and Governing Web Service Contracts
For Web services to succeed as part of SOA, they require balanced, effective technical contracts that enable services to be evolved and repeatedly reused for years to come.... |  |  The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)
The Java EE 6 Tutorial: Basic Concepts, Fourth Edition, is a task-oriented, example-driven guide to developing enterprise applications for the Java Platform, Enterprise Edition 6 (Java EE 6). Written by members of the Java EE 6 documentation team at Oracle, this book provides new and intermediate Java programmers with a deep... |  |  The Battle for Barrels: Peak Oil Myths & World Oil Futures
The Battle for Barrels demonstrates that the doom and gloom of the peak oil theory is mistaken. Duncan Clarke rebuts the arguments of peak oil’s adherents and discusses the issues they ignore—rising prices, new or future technologies, potential improved exploration, access to restricted world oil zones, changes in... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |